WO1988001408A1 - Systeme regulant l'acces a une memoire d'informations - Google Patents

Systeme regulant l'acces a une memoire d'informations Download PDF

Info

Publication number
WO1988001408A1
WO1988001408A1 PCT/GB1987/000552 GB8700552W WO8801408A1 WO 1988001408 A1 WO1988001408 A1 WO 1988001408A1 GB 8700552 W GB8700552 W GB 8700552W WO 8801408 A1 WO8801408 A1 WO 8801408A1
Authority
WO
WIPO (PCT)
Prior art keywords
units
code
information
time
storage means
Prior art date
Application number
PCT/GB1987/000552
Other languages
English (en)
Inventor
Robin Walker
Original Assignee
Runtime Innovations Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Runtime Innovations Limited filed Critical Runtime Innovations Limited
Priority to BR8707421A priority Critical patent/BR8707421A/pt
Publication of WO1988001408A1 publication Critical patent/WO1988001408A1/fr
Priority to DK207588A priority patent/DK207588A/da
Priority to NO881648A priority patent/NO881648L/no
Priority to KR1019880700406A priority patent/KR880701908A/ko

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30003Arrangements for executing specific machine instructions
    • G06F9/3005Arrangements for executing specific machine instructions to perform operations for flow control
    • G06F9/30061Multi-way branch instructions, e.g. CASE
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Definitions

  • the present invention relates to a system for controlling the access to a store of information stored in divisable form in machine readable media using a unique code and particularly, but not exclusively, is suitable for controlling the length of time a computer program is used.
  • the system can also be used to control the length of time a piece of hardware, such as a VCR or computer' is used.
  • An object of the present invention is to provide a system which obviates or mitigates the aforesaid disadvantages.
  • each program which uses codes to control and monitor the access by a user to a store of information units, for example if the units are time, the length of time the program is run by the host operating system, is controlled.
  • the program is provided to a user who wishes to run the program for a predetermined time. The user pays for this time and in return receives a special key or code which the user enters into the system.
  • the system includes a key storage unit which is specially formatted and cannot be read by the host device or system, only by a special read/write format available to the distributor or manufacturer.
  • the key storage unit has a plurality of keys which act as addresses for time units which control the time of operation the program is to be run using the host system clock.
  • the number of timed units for this code is rendered sub ⁇ sequently inaccessible, by for example being set to zero automatically so that it cannot readily be used again for free.
  • the program can then be run continuously until a cumulated predetermined time is reached and at the end of the time the program operation is terminated.
  • the user can extend operation by obtaining additional keys, subject to payment, to run the program for as long as suitable. With this syte the user does not buy the computer program but effectively hires it from the owner or distributor.
  • the key storage unit is a floppy diskette having a specially formatted track, normally the 80th track, in which 9 numbered segments are provided.
  • Each segment can have 128 pairs of numbers consisting of a code or key number which acts as an address and a corresponding data pocket in the form of time units.
  • the time units can be the same or di-fferent.
  • the key storage unit can be an optical disk or programmable chip, or hard disk or laser card or other smart card.
  • a control system for controlling access by a host operating system to a store of information stored in divisable form in machine readable media using a unqiue code
  • said control system comprising, storage means for storing plurality of un'qiue codes and corresponding information units, said storage means being normally unreadable by the host operating system, said storage means being adapted to be coupled to said host operating system via a control device and a unique code obtainable by the user, said host operating system having code input means for entering said code into said storage means via said control device, said unique code allowing the use of a number of information units stored in said storage means, the number of information units used being monitored by an information units counter of said host operating system, and comparison means for comparing the number of units used with the available total number of units for that unique code to permit continued access to said store of information for said corresponding number of information units, and security means coupled to said storage means for causing the number of information units corresponding to said unqiue code rendered sub ⁇ sequently in
  • said units are rendered subsequently inaccessible by setting said number of units corres ⁇ ponding to said unique code to be set to zero.
  • said information units are units of time and said information unit counter is a time clock.
  • said storage means if a magnetic disk having a specially formatted track thereon, said track ' - having at least one segment having a plurality of pairs of codes and corresponding time units. Conveniently there are nine segments on the track with each track having 128 pairs of codes and corresponding time units.
  • said control device is a computer and the interface to the control device is a keyboard.
  • the storage means can be a Winchester disk, floppy disk or any other suitable device.
  • a method of controlling access by ahost operating system to a store of infor ⁇ mation stored in divisable form in machine readable media using a unique code comprising the steps of, providing a storage means having a plurality of unique codes each with a corresponding number of information units, coupling said storage means to said host operating system, providing a unique code for entry into said host operating system, said unique code being identifiable by said storage means, releasing an in ⁇ formation unit corresponding to said code, monitoring a counter of said host operating system, and comparing the elapsed units of codes and corresponding time units.
  • control device is a computer and the interface to the control device is a keyboard.
  • the storage means can be a Winchester disk, floppy disk or any other suitable device.
  • a method of controlling access by a host operating system to a store of information stored in divisable form in machine readably media using a unqiue code comprising the steps of, providing a storage means having a plurality of unique codes each with a corresponding number of information units, coupling said storage means to said host operating system, providing a unique code for entry into said host operating system, said unique code being identifiable by said storage means, releasing an information unit corresponding to said code, monitoring a counter of said host operating system, and comparing the elapsed units with the number of available infor ⁇ mation units permitting access to sa.id store of infor- ation for said corresponding number of information units and after releasing said number of information units, rendering the number of information units corresponding to said code to be inaccessible. .
  • said number of information untis is rendered accessible by setting the number to zero after they have been released by said previously entered code.
  • Preferably said method includes the step of entering said code into said host operating system via a keyboard.
  • said method includes the'step of receiving an additional code corresponding to an additional time unit for increasing the length of time said computer program is used.
  • a storage device for use with a control system for controlling access by a host operating system to a store of information stored in divisable form in a machine readable media using a unique code, said storage means comprising a storage element having at least one specially formatted area which is unreadable by the host operating system, said area having at least one portion with a plurality of pairs of numbers, each pair having a unique code and a corresponding number of information units, said unique code identifying, when selected, the corresponding number of information units for controlling a counter associated with the host system to operate until a count corresponding to said number of information units has elapsed.
  • Fig. 1 is a block diagram of a system according to an embodiment of the invention.
  • Fig. 2 is a detailed view of the storage unit of Fig. 1;
  • Fig. 3 is an enlarged view of a segment of the track shown in Fig. 2;
  • Fig. 4 is a general block diagram of the time control sequence of a computer program
  • Fig. 5 is a block diagram of a time-control segment of a computer program for a specific appli- cation.
  • Fig. 6 is a block diagram of a control sequence of a system applied to a write-once read many times media in accordance with the present invention
  • Fig. 7 is a schematic diagram of a portion of a media layout used with the arrangement shown in Fig. 6;
  • Fig. 8 is a block diagram similar to Fig. 6 but used with an erasable media
  • Fig. 9 is a schematic representation of a system in accordance with the invention used with a satellite information transmission system. ⁇ •
  • Fig. 1 of the drawings shows a control system in accordance with an embodiment of the invention.
  • the system comprises an operating device 10, typically computer running an application program, which is coupled to a control device 12, typically a programmed computer.
  • the control device 12 is able to read time clock 14 which allows the control device to monitor the run time of the operating device 10.
  • the control device 10 is connected to an interface 16, which is typically a keyboard or VDU, and to a key storage means 18 in the form of a floppydisk 20, as best seen in Fig. 2, in which coded time sequences are stored for controlling the accumulatedruntime the application program is used, as will be later described in detail.
  • Fig. 2 of the drawings shows disk 20 which has a specially formatted track 22, typically track number 80, thereon.
  • the formatting is performed using a special read/write format and cannot be read by the operating system of the host.
  • the track 80 contains 9 segments 24, each segment 24 of which contains 128 pairs of numbers.
  • One number in each pair is a code and the other number is a number of time units.
  • the number of time units may be the same or different for each code.
  • the codes cannot be read by the user and are only provided by the owner on payment of a certain • - amount.
  • the time unit number is transferred to the first code #312 and the number of units corresponding to #681 is set to zero. Only the time units (600) corresponding to code #312 can be used. This prevents the same code #612 from being used to repeatedly access time units.
  • the operational sequence of the arrangement depicts in Figs. 1-3 is best seen in the block diagram of Fig. 4.
  • the controlling device 12 requests the matching of a data unit of one stored in an area of the key storage unit 18 to ensure that a valid storage device 18 is present. If a match is not made then the controlled device denies further use of the operational unit.
  • the device accesses an area of the storage unit containing current allowable operational time. If this time is found to be greater than zero, then operation is allowed until the time becomes zero or the device operation is terminated by external means, for example, switching the machine off or removing the floppy disk 20. If this current allowable time is zero or less, then the controlling device requests the user to provide a new alphanumeric data unit via the interface 16. This new data is checked with others on the storage device until a match is found, or all data has been checked without a match being found.
  • the operational device If no match is found the operational device is de-activated but if a match., is_found then the allowable time associated with the data unit is transferred to the allowable time location in the storage device and the allowable time at the location associated with the particular unit is made zero to prevent subsequent use of the data unit when the new current allowable time becomes zero, and a further alphanumeric data unit is requested via the interface. This procedure is explained above with reference to codes 681 and 312.
  • control device 12 notes the lapsed operational time between the storing and the most recent noting during current operational period, and deducts this lapsed time from the current allowable time from the storage device. At intervals during the operation of the operational device 10, control device 12 also per ⁇ forms a matching operation to ensure that the valid storage 18 remains present. If, for any reason, the valid storage unit 18 has been removed or disconnected then further operation of the operational device 10 is prevented. - li ⁇
  • FIG. 5 of the drawings which is similar to Fig. 4 except that this drawing is a block diagram of a particular application using the system to log operation time on a micro-computer - - operating under the MS-DOS system, utilising as a unit 18 as a key storage device logging the new time of an application program.
  • the storage device 20 has 9 segments 24 in the specially formatted track 22 and each of these sectors as explained above contains up to 128 pairs of numbers.
  • the first number in the sector is a matching security number of a code to ensure that the security diskette is valid and the second number is the current allowable new time in minutes for running the particular program. It will be seen that the remaining numbers can be paired off with the key number and its associated run timed in minutes.
  • the program number is checked against the first number for a successful match and if a match is not found the application program is termin- , ated. If a match is found the system then checks if the time allowable, which is the second number greater than zero, and if not a new number is typed in and all number sectors are checked for a new match. Three attempts are permitted and if no match is found after three attempts the program is terminated.
  • the number that is pair matched becomes the new allowable time CT1 and this is put in the first position in the first sector as explained above.
  • the current time for the internal clock TI is then noted and the program is run until a time clock command is found and this becomes time T2.
  • T2 is subtracted from TI (TI - T2) to obtain a time T3 and this is placed in the sector at the second number and this is looped back in the program so that the check is again carried out to see if the time allowable in the second number is greater than zero and this operation continues until the time is equal to or less than zero at which time the application program will become terminated.
  • Figs. 6 and 7 which relates to a further application and embodiment of the system according to the invention.
  • the media is one containing a plurality of codes which can be written on once only known as WORM (write-once read many times) such as an optical disk or laser card or the like in contrast to a magnetic standard floppy disk.
  • WORM write-once read many times
  • Each code, code 1,2,3 etc. has one adjacent space for permitting the code to be repeated, and also a plurality of predetermined spaces "in the same line" to record the number of uses of the code. indicated by '1' . The number of uses is terminated by a '0'.
  • a line (line 1) contains spaces reserved for current codes and also a list of codes previously used.
  • Line 1 shows that the code currently in use is code 3 and this has been used, according to line 6, 3 times out of a possible 32 times.
  • Lines 4 and 5 show that the units available- in association-with code 1- — and code 2 have been fully utilised.
  • the system operates by checking if a valid key device eg. disk, laser card is present and then line 1 is scanned for the last code used which is deemed to be the current code. The. current code area is then scanned ie. code 3 in line 6 to check if any units remain. If units remain, and are used, line 6 is updated with a '1' code. If no units remain ie.
  • a '0' is present, then a new code is requested and checked for a match. If a match is found the valid 'key' presence is checked. If not the process is repeated for a preset number of times before a 'corrput key" signal is created.
  • code duplication is used instread of erasing the codes as aforedescribed, to control access, although a further modification is to permit the same code to be used a preset number of times. This is, in the broadest sense, a code used once is repeated and can be preset for 1 use only. No further access to information from this code will be permitted providing the same security effect as with the aforedescribed code erasure system.
  • F.ig. 8 of the drawings which is similar to Fig. 6 except that the media is erasable.
  • This can be operated as for code duplication or with code erasure to permit access control to information.
  • the system operates, after having ascertained that a valid key is present, by reading the available units TI, if the units satisfies the test TI > 0 then TI is written to the key. If TI ⁇ 0 a new code is required and is entered until a match is found, whereupon the units associated with code Tc are located and the location of the code set to zero. Tc is written into TI, €hat is Tc is written - into the current available units area. If no match is found after three attempts then a corrupt key is actuated,
  • Fig. 9 depicts a diagrammatic application of the system applied to satellite transmission of information.
  • Be ⁇ cause satellite communication channels can handle ' ' large volume"of data- transmission at high rates of transmission it would be suited for use with the system for control access to the information.
  • the information transmits from ground transmission station 40 to ground receiving station 42 via satellite 44 is passed to a decoder 46 associated with a display unit 48.
  • a key unit 50 such as hereinbefore described is coupled to the decoder and information transmitted over the satellite link cannot be accessed until the user obtains 'key codes', which provides control of access to the information and its use as aforedescribed.
  • the key could be on a smart card for example and could be used to 'buy' and monitor units of information received.
  • the card could contain 1000 'information units' and a new code is required each time the card is used, for example for each 20 information units.
  • one aspect of established prior art is to provide access to information on a remote computer over a telephone connection or other form of communication.
  • this invention it has not been possible to control access to information which may have been down loaded from the remote computer to a storage device within or attached to the users system and then to allow off ⁇ line use of this information because there was no means of protecting copyright or charging for use.
  • An improve ment on this prior art is to incorporate a key device within the users system to control access to the down loaded information be it data, software or some other type of information. Copies-of the information etc cannot be used unless further key devices have been provided.
  • CD- compact disc with 30/40 programs instead of separate programs no matter what software a vendor or manufacturer wishes to distribute.
  • Large capacity hard cards and CD-ROMS made this process possible, and these can be - accessed as required by a secure means of controlling access either to, only these programs which have been purchased, or to providing access to all the software on a use charge basis.
  • This invention allows either of these' options and indeed, controls access to both purchased software, by preventing use of copies, and to charged use software.
  • Advantages of the invention are that the purchase of expensive information, for example, computer programs is obviated, and the user is able to have the most up- to-date programs . as and when they require it according to their particular budget.
  • the user has flexibility when he uses a program merely obtaining a code at a particular time when it suits him to run the' program.

Abstract

Système régulant l'accès d'un utilisateur à une mémoire d'informations dans un système de stockage d'informations, utilisant des codes uniques associés avec un nombre correspondant d'unités d'informations. Ce système peut être employé, par exemple, pour limiter la durée pendant laquelle un programme d'ordinateur est utilisé par un système hôte. Dans ce cas, le programme est fourni à l'utilisateur désirant l'utiliser pendant un certain temps. L'utilisateur paie en fonction de la durée d'utilisation prévue et reçoit en échange une clé spéciale ou un code spécial qu'il introduit dans le système. Ce dernier comprend une unité de stockage de clé (18) qui est formatée spécialement et ne peut pas être lue par l'installation ou le système hôte (10), mais uniquement à l'aide d'un format de lecture/écriture réservé au distributeur ou au fabricant. L'unité de stockage de clé (18) présente une pluralité de clés (16) servant d'adresses à des unités de temps qui limitent le temps d'utilisation du programme au moyen de l'horloge du système hôte (14). Lorsqu'une clé valable est communiquée à l'utilisateur et introduite par celui-ci dans le système pour faire démarrer le programme, le nombre d'unités de temps pour ce code est rendu inaccessible, par exemple par une remise à zéro automatique, de manière qu'il ne puisse pas être utilisé de nouveau gratuitement. Le programme peut alors être utilisé de manière continue jusqu'à ce que le temps prédéterminé se soit écoulé, après quoi l'utilisation est interrompue. L'utilisateur peut la prolonger en obtenant contre paiement des clés supplémentaires, lui permettant d'utiliser le programme aussi longtemps qu'il le désire. Grâce à ce système, l'utilisateur n'achète pas le logiciel mais le loue au propriétaire ou au distributeur. Des formes d'exécution de l'invention sont également décrites.
PCT/GB1987/000552 1986-08-16 1987-08-03 Systeme regulant l'acces a une memoire d'informations WO1988001408A1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
BR8707421A BR8707421A (pt) 1986-08-16 1987-08-03 Sistema para controlar o acesso a uma memoria de informacoes
DK207588A DK207588A (da) 1986-08-16 1988-04-15 System til styring af tilgang til et informationslager
NO881648A NO881648L (no) 1986-08-16 1988-04-15 Kontrollsystem for adgang til informasjon.
KR1019880700406A KR880701908A (ko) 1986-08-16 1988-04-16 정보 기억에 대한 액세스 제어용 시스템

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB8619989 1986-08-16
GB868619989A GB8619989D0 (en) 1986-08-16 1986-08-16 Controlling length of time

Publications (1)

Publication Number Publication Date
WO1988001408A1 true WO1988001408A1 (fr) 1988-02-25

Family

ID=10602814

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1987/000552 WO1988001408A1 (fr) 1986-08-16 1987-08-03 Systeme regulant l'acces a une memoire d'informations

Country Status (9)

Country Link
US (1) US4868736A (fr)
EP (1) EP0277967A1 (fr)
JP (1) JPH01500623A (fr)
KR (1) KR880701908A (fr)
AU (1) AU599694B2 (fr)
BR (1) BR8707421A (fr)
DK (1) DK207588A (fr)
GB (1) GB8619989D0 (fr)
WO (1) WO1988001408A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2223610A (en) * 1988-08-01 1990-04-11 Expert Electronic Co Ltd Power control security system for a computer
GB2293901A (en) * 1994-09-20 1996-04-10 Mitsubishi Electric Corp Information processor
EP0964397A3 (fr) * 1993-06-07 2007-12-19 Hitachi, Ltd. Appareil d'enregistrement/de reproduction d'information numérique

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5335334A (en) * 1990-08-31 1994-08-02 Hitachi, Ltd. Data processing apparatus having a real memory region with a corresponding fixed memory protection key value and method for allocating memories therefor
DE69535701T2 (de) * 1994-07-08 2009-02-12 Sony Corp. Empfangszugriffsgesteuerte Rundfunksignale
JPH08263438A (ja) 1994-11-23 1996-10-11 Xerox Corp ディジタルワークの配給及び使用制御システム並びにディジタルワークへのアクセス制御方法
CN1183841A (zh) 1995-02-13 1998-06-03 英特特拉斯特技术公司 用于安全交易管理和电子权利保护的系统和方法
US6948070B1 (en) 1995-02-13 2005-09-20 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US7133846B1 (en) 1995-02-13 2006-11-07 Intertrust Technologies Corp. Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
US5892900A (en) 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6157721A (en) 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US5943422A (en) 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US6658568B1 (en) 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US7133835B1 (en) * 1995-08-08 2006-11-07 Cxn, Inc. Online exchange market system with a buyer auction and a seller auction
WO1997016797A1 (fr) 1995-10-30 1997-05-09 Cars Incorporated By Fusz Systeme d'echange de produits
GB2331821A (en) * 1997-11-27 1999-06-02 Northern Telecom Ltd Electronic sealed envelope
FI107488B (fi) 1999-05-10 2001-08-15 Nokia Networks Oy Menetelmä ja järjestelmä puhelinkeskusjärjestelmässä
US6912528B2 (en) * 2000-01-18 2005-06-28 Gregg S. Homer Rechargeable media distribution and play system
US8275716B2 (en) 2001-05-31 2012-09-25 Contentguard Holdings, Inc. Method and system for subscription digital rights management
US20030074323A1 (en) * 2001-10-02 2003-04-17 Koninklijke Philips Electronics N.V. Business model for downloadable video games
US20040133600A1 (en) * 2002-07-19 2004-07-08 Homer Gregg S. Rechargeable media distribution and play system
US7606632B2 (en) * 2004-06-16 2009-10-20 Cryovac, Inc. Apparatus for dispensing activated monitoring devices
US7376062B2 (en) * 2004-10-29 2008-05-20 International Business Machines Corporation System and method for logical shredding of data stored on worm media
JP2007233924A (ja) * 2006-03-03 2007-09-13 Sony Corp 情報処理システム、情報処理装置および方法、プログラム、並びに記録媒体

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS57726A (en) * 1980-05-30 1982-01-05 Usac Electronics Ind Co Ltd Operation controlling system of information processor
BE900479A (nl) * 1984-08-31 1984-12-17 Smets Raph Magnetische drager, o.m. diskette, die tegen ongeoorloofd kopieren is beveiligd.
EP0135422A1 (fr) * 1983-08-11 1985-03-27 Societe Civile "A.B.C.D." Dispositif de protection de logiciels utilisés par un ordinateur connecté à au moins un terminal périphérique
US4593376A (en) * 1983-04-21 1986-06-03 Volk Larry N System for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expires

Family Cites Families (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3609697A (en) * 1968-10-21 1971-09-28 Ibm Program security device
US4120030A (en) * 1977-03-11 1978-10-10 Kearney & Trecker Corporation Computer software security system
US4200913A (en) * 1977-04-13 1980-04-29 International Business Machines Corporation Operator controlled programmable keyboard apparatus
US4253157A (en) * 1978-09-29 1981-02-24 Alpex Computer Corp. Data access system wherein subscriber terminals gain access to a data bank by telephone lines
US4305131A (en) * 1979-02-05 1981-12-08 Best Robert M Dialog between TV movies and human viewers
US4236217A (en) * 1979-04-20 1980-11-25 Kennedy Stanley P Energy utilization or consumption recording arrangement
US4306289A (en) * 1980-02-04 1981-12-15 Western Electric Company, Inc. Digital computer having code conversion apparatus for an encrypted program
US4361877A (en) * 1980-02-05 1982-11-30 Sangamo Weston, Inc. Billing recorder with non-volatile solid state memory
JPS56140452A (en) * 1980-04-01 1981-11-02 Hitachi Ltd Memory protection system
EP0067998B1 (fr) * 1980-09-26 1986-04-16 Bo LÖFBERG Procede de traitement d'un signal d'information et moyen de mise en oeuvre du procede
US4513174A (en) * 1981-03-19 1985-04-23 Standard Microsystems Corporation Software security method using partial fabrication of proprietary control word decoders and microinstruction memories
US4446519A (en) * 1981-05-26 1984-05-01 Corban International, Ltd. Method and apparatus for providing security for computer software
US4433207A (en) * 1981-09-10 1984-02-21 Best Robert M Cryptographic decoder for computer programs
US4471163A (en) * 1981-10-05 1984-09-11 Donald Thomas C Software protection system
US4670857A (en) * 1981-10-26 1987-06-02 Rackman Michael I Cartridge-controlled system whose use is limited to authorized cartridges
US4593353A (en) * 1981-10-26 1986-06-03 Telecommunications Associates, Inc. Software protection method and apparatus
US4454594A (en) * 1981-11-25 1984-06-12 U.S. Philips Corporation Method and apparatus to secure proprietary operation of computer equipment
US4442486A (en) * 1981-11-25 1984-04-10 U.S. Philips Corporation Protected programmable apparatus
US4553252A (en) * 1981-12-21 1985-11-12 Egendorf Harris H Counting computer software cartridge
EP0084441A3 (fr) * 1982-01-19 1984-08-22 Tabs Limited Méthode et appareil pour la protection de la propriété de programmes d'ordinateur
US4458315A (en) * 1982-02-25 1984-07-03 Penta, Inc. Apparatus and method for preventing unauthorized use of computer programs
AU542447B2 (en) * 1982-02-27 1985-02-21 Fujitsu Limited System for controlling key storage unit
FR2523745B1 (fr) * 1982-03-18 1987-06-26 Bull Sa Procede et dispositif de protection d'un logiciel livre par un fournisseur a un utilisateur
US4494156A (en) * 1982-05-14 1985-01-15 Media Systems Technology Selectable format computer disk copier machine
US4462076A (en) * 1982-06-04 1984-07-24 Smith Engineering Video game cartridge recognition and security system
US4462078A (en) * 1982-08-02 1984-07-24 Ron Ross Computer program protection method
US4680731A (en) * 1983-03-17 1987-07-14 Romox Incorporated Reprogrammable cartridge memory with built-in identification circuitry and programming method
US4597058A (en) * 1983-05-09 1986-06-24 Romox, Inc. Cartridge programming system
US4658093A (en) * 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
US4584641A (en) * 1983-08-29 1986-04-22 Paul Guglielmino Copyprotecting system for software protection
US4562306A (en) * 1983-09-14 1985-12-31 Chou Wayne W Method and apparatus for protecting computer software utilizing an active coded hardware device
US4652990A (en) * 1983-10-27 1987-03-24 Remote Systems, Inc. Protected software access control apparatus and method
US4577289A (en) * 1983-12-30 1986-03-18 International Business Machines Corporation Hardware key-on-disk system for copy-protecting magnetic storage media
US4646234A (en) * 1984-02-29 1987-02-24 Brigham Young University Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs
US4562495A (en) * 1984-07-02 1985-12-31 Verbatim Corporation Multiple system disk
GB2163577B (en) * 1984-08-23 1988-01-13 Nat Res Dev Software protection device
US4644493A (en) * 1984-09-14 1987-02-17 International Business Machines Corporation Implementing a shared higher level of privilege on personal computers for copy protection of software
JPS61166652A (ja) * 1985-01-19 1986-07-28 Panafacom Ltd 記憶保護例外による割込み発生方式
US4713753A (en) * 1985-02-21 1987-12-15 Honeywell Inc. Secure data processing system architecture with format control
US4688169A (en) * 1985-05-30 1987-08-18 Joshi Bhagirath S Computer software security system
US4685056A (en) * 1985-06-11 1987-08-04 Pueblo Technologies, Inc. Computer security device
GB2182467B (en) * 1985-10-30 1989-10-18 Ncr Co Security device for stored sensitive data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS57726A (en) * 1980-05-30 1982-01-05 Usac Electronics Ind Co Ltd Operation controlling system of information processor
US4593376A (en) * 1983-04-21 1986-06-03 Volk Larry N System for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expires
EP0135422A1 (fr) * 1983-08-11 1985-03-27 Societe Civile "A.B.C.D." Dispositif de protection de logiciels utilisés par un ordinateur connecté à au moins un terminal périphérique
BE900479A (nl) * 1984-08-31 1984-12-17 Smets Raph Magnetische drager, o.m. diskette, die tegen ongeoorloofd kopieren is beveiligd.

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PATENT ABSTRACTS OF JAPAN, Volume 6, No. 59 (P-110)(937), 16 April 1982, see the Abstract & JP, A, 57 000726 (Usac Denshi Kogyo K.K.) 5 January 1982 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2223610A (en) * 1988-08-01 1990-04-11 Expert Electronic Co Ltd Power control security system for a computer
EP0964397A3 (fr) * 1993-06-07 2007-12-19 Hitachi, Ltd. Appareil d'enregistrement/de reproduction d'information numérique
US8472785B2 (en) 1993-06-07 2013-06-25 Samsung Electronics Co., Ltd. Digital information recording-reproducing apparatus
GB2293901A (en) * 1994-09-20 1996-04-10 Mitsubishi Electric Corp Information processor
GB2293901B (en) * 1994-09-20 1998-11-18 Mitsubishi Electric Corp Information processor

Also Published As

Publication number Publication date
GB8619989D0 (en) 1986-09-24
AU7782587A (en) 1988-03-08
KR880701908A (ko) 1988-11-07
EP0277967A1 (fr) 1988-08-17
US4868736A (en) 1989-09-19
JPH01500623A (ja) 1989-03-01
AU599694B2 (en) 1990-07-26
BR8707421A (pt) 1988-11-01
DK207588D0 (da) 1988-04-15
DK207588A (da) 1988-06-14

Similar Documents

Publication Publication Date Title
US4868736A (en) Code operated access control system for electronic data store
EP0752149B1 (fr) Systeme interactif pour disque compact
CN101142581B (zh) 向便携式数据存储装置的用户传递消息作为其使用条件
US6799084B2 (en) Data vending system
US6222807B1 (en) Information center, terminal apparatus, dubbing system and dubbing method
KR100832139B1 (ko) 단말장치, 부과금 시스템 및 데이터 처리방법
EP0195098A1 (fr) Système de reproduction d'informations sous forme matérielle à un point de vente
KR19980703213A (ko) 대화형 트랜잭션 관리 멀티미디어 시스템
JP2014112368A (ja) データ記憶およびアクセスシステム
US7334051B2 (en) Data distribution system, terminal apparatus, distribution center apparatus, high-efficiency encoding method, high-efficiency encoding apparatus, encoded data decoding method, encoded data decoding apparatus, data transmission method, data transmission apparatus, sub information attaching method, sub information attaching apparatus, and recording medium
KR19980070408A (ko) 암호키 생성 방법, 광 디스크 재생 방법과 광 디스크 재생 장치및 광 디스크 재생 허가 방법
US20070174200A1 (en) Medium purchase and playback protection system and its method
JPH06208760A (ja) データ再生管理システム
US7860947B2 (en) Storage medium and downloading method
GB2305339A (en) Providing temporary access to data
US6680889B1 (en) Data recording medium and data recording apparatus
CN101031969B (zh) 磁盘内容管理方法
US20020021806A1 (en) Content reproduction apparatus
JPH11167769A (ja) 再生情報管理システム,情報記録媒体,管理媒体,再生装置,及び再生方法
EP2048593A2 (fr) Système de fourniture du contenu, procédé de fourniture de contenu et disque optique
JP2002007606A (ja) 利用制限を施したソフトウェアーの配信・提供システム
KR19990034099A (ko) 원격대여시스템 및 그 제어방법
JP2005327324A (ja) コンテンツの記録制御装置、記録制御方法およびコンピュータプログラム
JP2003067829A (ja) データ提供システム、データ提供方法、およびプログラム

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU BR DK JP KR NO SU

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE FR GB IT LU NL SE

WWE Wipo information: entry into national phase

Ref document number: 1987904923

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1987904923

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1987904923

Country of ref document: EP